IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 3, MARCH 2013

1255

Throughput Maximization for Multi-Hop Wireless Networks with Network-Wide Energy Constraint Canming Jiang, Yi Shi, Member, IEEE, Y. Thomas Hou, Senior Member, IEEE, Wenjing Lou, Senior Member, IEEE, and Hanif D. Sherali

Abstract—The cost of energy consumption is an important concern for network operators. In this paper, we study an energy-related problem that focuses on network-wide energy consumption. In the first part of this work, we study how to maximize throughput under a network-wide energy constraint. We formulate this problem as a mixed-integer nonlinear program (MINLP). This formulation differs from prior efforts as it considers a non-zero device power, which complicates the problem. We propose a novel piece-wise linear approximation to transform the nonlinear constraints into linear constraints. We prove that the solution developed under this approach is near-optimal with a guaranteed performance bound. In the second part, we generalize the problem in the first part via a multicriteria optimization framework, which simultaneously optimizes throughput and total network energy. We show how weakly Pareto-optimal solutions can characterize an optimal throughput-energy curve. We offer some interesting properties of the optimal throughput-energy curves, which are useful to both network operators and endusers. Our results fill in some important gaps in the current understanding on optimizing total network energy. Index Terms—Energy optimization, total network energy, network throughput, multicriteria optimization, multi-hop wireless networks.

I. I NTRODUCTION

E

NERGY has been, and will remain, a fundamental concern for wireless networks. In this paper, we focus on total network energy (or network-wide energy), which is not a well studied area but is of critical importance to network operators. Specifically, we explore the following two problems: (i) How to maximize network throughput under a given total network energy constraint. The solution to this question will help network operators achieve the highest performance (throughput) under a given energy budget. (ii) How to simultaneously optimize both network throughput and network-wide energy consumption. This problem generalizes the first one and its solution allows us to understand the relationships and tradeoffs between network throughput and total network energy.

Manuscript received May 6, 2012; revised August 26 and December 20, 2012; accepted December 29, 2012. The associate editor coordinating the review of this paper and approving it for publication was C.-F. Chiasserini. An abridged version of this paper [12] was presented at IEEE INFOCOM, Orlando, Florida, March 25–30, 2012. C. Jiang, Y. Shi, and Y. T. Hou (corresponding author) are with the Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA 24061, USA (e-mail: {jcm, yshi, thou}@vt.edu). W. Lou is with the Department of Computer Science, Virginia Tech, Falls Church, VA 22043, USA (e-mail: [email protected]). H. D. Sherali is with the Grado Department of Industrial and Systems Engineering, Virginia Tech, Blacksburg, VA 24061, USA (e-mail: [email protected]). Digital Object Identifier 10.1109/TWC.2013.013013.120636

We recognize that there is a wealth of literature on optimizing network throughput with energy constraints. A major thrust of these prior efforts was to develop various heuristic approaches for physical, link, and network layer operational schemes (see, e.g., [14], [21], [23]). This is in contrast to our work in this paper, which follows a formal optimization framework with the goal of offering a performance guarantee for the final solution. Among related works that adopt formal optimization frameworks in studying network throughput maximization with energy consideration (see, e.g., [1], [9], [20]), we find that most of these works only consider per-link power constraints or per-node power constraints. Although such an approach is important to characterize local energy consumption, it cannot be easily extended to address problems for network-wide energy due to the complex inter-dependency among the layers. Our work is complementary to a branch of previous work that addresses how to minimize network-wide energy consumption while satisfying some traffic demands (see, e.g., [15], [18]). These works are orthogonal to the problem that we study in the first part of this paper. In some sense, the problem studied in this paper is the dual to these existing works. However, a main departure from these works is our consideration of the device power, which introduces a new combinatorial aspect into the problem. As a result, our problem is much more difficult to solve, and hence a novel approximation approach that is asymptotically optimal is proposed in the paper. It will soon be clear that our mathematical formulation and proposed solution procedure differ from all seemingly similar prior efforts. Further, in the second part of this paper, we consider the joint optimization of throughput and network-wide energy based on multicriteria optimization, which is an area that is not well studied in network energy conservation contexts. The main contributions of this paper are the following: •

First, we study how to maximize network throughput under a total network energy constraint. Our problem considers device power, which is relevant in practice. We show that this problem can be formulated as a mixed-integer nonlinear program (MINLP). To solve this problem efficiently, we exploit its mathematical structure and propose a novel piece-wise linear approximation that is asymptotically optimal. This approximation allows to transform the nonlinear constraints into linear constraints. We prove that the solution developed under this linear approximation is near-optimal in the sense that the performance gap between our solution and the optimal solution

c 2013 IEEE 1536-1276/13$31.00 

1256

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 3, MARCH 2013

(unknown) can be made arbitrary small as per required accuracy. • Second, we generalize the problem in the first part by exploring the joint optimization of both network throughput and network energy consumption via a multicriteria optimization framework, i.e., by maximizing network throughput while minimizing network-wide energy consumption. The set of weakly Pareto-optimal points characterize an optimal throughput-energy curve. This curve shows how the maximum network throughput changes with the total network energy. We offer some interesting properties of this optimal throughput-energy curve, which are of importance to both network operators and endusers. • Third, we conduct extensive numerical experiments to show the efficacy of our proposed approach and to validate our theoretical findings. We present numerical results for 50-node, 100-node, and 200-node networks. These results offer further insights in addition to validating our proposed solution procedure. The remainder of this paper is organized as follows. In Section II, we describe our network model. In Section III, we study the problem of how to maximize network throughput under a given total network energy. In Section IV, we study how to optimize both network throughout and energy under a multicriteria framework. Section V presents numerical results, and Section VI concludes this paper. II. N ETWORK M ODEL Consider a multi-hop wireless ad hoc network that is represented by a directed graph G = {N , L}, where N and L are the sets of nodes and directional links, respectively. A link between two nodes exists if and only if the distance between the two is within a certain transmission range. If two nodes are not within one-hop of each other, then a node has to use multihops to relay messages. We assume orthogonal channels on all links (similar to that in [3], [13], [16]). This can be done by some interference avoidance mechanism (e.g., OFDMA). Note that orthogonal channels do not require as many channels as the number of active links in the network since one can reuse channels on links that are spatially far away from each other. This is called spatial reuse and is commonly used in wireless networks to improve channel efficiency. Note that designing a channel assignment algorithm to achieve orthogonality has been well studied in the literature and its discussion is beyond the scope of this paper. We assume that there is a set F of active communication sessions in the network. Each session involves a single-source single-destination unicast flow. Denote s(f ) and d(f ) as the source and destination nodes of session f ∈ F , respectively. To differentiate the importance of these user sessions, each session f is assigned a weight w(f ).1 Let r(f ) be the data rate of session f . The network throughput U in this paper is represented  by the sum of weighted session rates, which is given by f ∈F w(f ) · r(f ). Table I lists all the notation used in this paper. 1 We assume that the weight of a flow is given a priori and is a constant. How to assign a weight to a flow is application-dependent (e.g., based on priority) and its discussion is beyond the scope of this paper.

TABLE I N OTATION . Symbol Bl cl dl F d(f ) L LIn i LOut i hl N pl Pd P Pnet r(f ) rl (f ) s(f ) U w(f ) yl η

Definition Channel bandwidth on link l Capacity of link l Distance between link l’s transmitting node and receiving node The set of user sessions in the network Destination node of session f ∈ F The set of links in the network The set of incoming links at node i The set of outgoing links at node i Channel gain on link l The set of nodes in the network Transmission power of link l Device  power consumption associated with an active link = l∈L (pl + yl Pd ), network-wide energy consumption rate Network-wide energy budget Data rate of session f ∈ F Data rate on link l that is attributed to session f Source  node of session f = f ∈F w(f )r(f ), the network throughput A weight assigned to session f ∈ F A binary variable indicating whether or not link l is active Ambient Gaussian noise density

A. Energy Consumption and Power Control When a wireless link is active for communication, its energy consumption includes transmission power at the transmitter (for data transmission over a distance), and device power at both the transmitter and the receiver (for encoding, modulation, decoding, demodulation, etc.) [5], [17]. Denote pl ≥ 0 as the transmission power at the transmitter for link l, which can be varied depending on transmission requirements. Let Pd be the constant device power when a link is active. Denote yl as a binary variable indicating whether or not link l is active, i.e.,  1 if link l is active; yl = 0 otherwise. When a link is active, we utilize the power Pd ; when a link is inactive, we do not. This behavior is readily modeled by multiplying Pd by yl (the link activity indicator). Incorporating the transmission power pl , the total power consumption rate of link l is therefore given by pl + yl Pd . Assume that the maximum transmission power of a node is Pmax . Then, we have the following relationship between pl and yl : pl ≤ yl · Pmax

(l ∈ L) .

(1)

For all active links at a node, we have the following node-level transmission power constraint:  pl ≤ Pmax (i ∈ N ) , (2) l∈LOut i

where LOut is the set of potential outgoing links at node i. i Denote P as the total energy consumption rate on all active links in the network. Then, the network-wide energy  consumption rate P can be written as P = l∈L (pl + yl Pd ) .

JIANG et al.: THROUGHPUT MAXIMIZATION FOR MULTI-HOP WIRELESS NETWORKS WITH NETWORK-WIDE ENERGY CONSTRAINT

B. Routing and Link Capacity To transport data from a source node to its destination node that is more than one-hop away, multi-hop relaying is necessary. Since single-path flow routing is overly restrictive and is likely suboptimal, we allow flow splitting so that data can be delivered along multi-path routes. We model multi-path flow routing as follows. Denote rl (f ) as the amount of flow rate on link l that is attributed to session f ∈ F . Denote LIn i as the set of potential incoming links at node i. If node i is the source node of session f , i.e., i = s(f ), then  rl (f ) = r(f ) . (3) l∈LOut i

m∈LIn i ,m=(d(f ),i)

If node i is the destination node of session f , i.e., i = d(f ), then  rl (f ) = r(f ) . (5) l∈LIn i

It can be easily verified that if (3) and (4) are satisfied, then (5) must be satisfied. As a result, it is sufficient to list only (3) and (4) in the formulation. It is worth pointing out that our multi-path routing model is a link-based model with variables rl (f ) (the flow rate on link l that is attributed to session f ) and r(f ) (the data rate of session f ). The number of variables is polynomial of O(|L| · |F |), where |L| is the number of links in the network and |F | is the number of sessions in the network. Under the above  flow routing scheme, the aggregate flow rate on link l is f ∈F rl (f ). Since the aggregate flow rate on any link cannot exceed the link’s capacity, we have the following link capacity constraint:  rl (f ) ≤ cl (l ∈ L) , (6) f ∈F

where cl is the capacity of link l. Given that we are employing orthogonal channels among the links in the network, we have: cl = Bl log2 (1 +

p l · hl ), ηBl

(7)

where Bl is the bandwidth of link l under a given channel assignment, hl is the channel gain between the transmitter and the receiver of link l, and η is the ambient Gaussian noise density. Combining (6) and (7), we have:  f ∈F

III. T HROUGHPUT M AXIMIZATION UNDER A T OTAL N ETWORK E NERGY C ONSTRAINT In this section, we study how to maximize network throughput under a given network-wide energy budget. This problem is motivated by the scenario where we have a strict total energy consumption limit in the network. For example, in a wireless mesh network, we may impose a total energy consumption constraint due to a given operating budget on energy, since the operational cost is directly proportional to energy consumption. The question that we pose is: Given the network-wide energy operating budget Pnet , i.e.,  P = (pl + yl Pd ) ≤ Pnet , (9) l∈L

If node i is an intermediate relay node of session f , i.e., i = s(f ) and i = d(f ), then   rl (f ) = rm (f ) . (4) l∈LOut ,l=(i,s(f )) i

1257

rl (f ) ≤ Bl log2 (1 +

p l · hl ) ηBl

(l ∈ L) .

(8)

Note that Constraint (8) couples the network flow variables (i.e., rl (f )) and the physical layer power variable pl over the links in the network.

how can we adjust the power on each link and perform multipath routing for each session so as to maximize the network throughput? Mathematically, this problem can be formulated as follows:  OPT: max U = w(f )r(f ) f ∈F

s.t.

Link power constraint: (1) Node power constraint: (2) Flow balance: (3), (4) Link flow constraint: (8) Total network energy constraint: (9) Variables yl ∈ {0, 1}, pl, rl (f ), r(f ) ≥ 0 (l ∈ L, f ∈ F) ,

where yl is a binary variable; pl , r(f ), and rl (f ) are continuous variables, and all the other parameters are constants. OPT is a mixed-integer nonlinear program (MINLP), which in general is NP-hard [10]. Note that the network-wide energy constraint complicates the overall problem by requiring binary variables. These binary variables are necessary due to our consideration of the device power Pd . If such a device power is neglected, then the binary variables can be removed, and the problem becomes a convex problem, which can be readily solved. But in practice, such a device power should be considered. Mathematically, this consideration differentiates this paper from previous works in this area. MINLP problems are known to be difficult due to the combinatorial nature of mixed-integer programs and the difficulty in solving nonlinear programs. Note that there exist some techniques to address general MINLP problems (e.g., outer-approximation methods [7], branch-and-bound [8], extended cutting plane methods [22], and generalized Benders’ decomposition [11]). But these techniques do not exploit our problem-specific structures and properties, and hence can only handle small-sized problems. In this paper, we exploit the unique mathematical structure of our MINLP problem and develop a novel near-optimal solution procedure with a performance guarantee. Note that in Problem OPT, the only nonlinear constraints are the link capacity constraints (8), which involve the log function. To address this problem, we propose a piece-wise linear approximation technique to transform the nonlinear constraints to

1258

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 3, MARCH 2013

ln(1 + sl )

Given a desired performance gap between the nearoptimal solution and the optimal solution to OPT Compute the maximum allowed piecewise linear approximation error Compute linear approximation constraints and construct OPT-R

(2) 0 s(1) l sl

(3)

sl

smax l

sl

Fig. 2. An illustration of piece-wise linear approximation with four linear segments.

Solve OPT-R via CPLEX Fig. 1. A flow-chart for obtaining a near-optimal solution to OPT.

linear constraints. Our main idea is as follows. We first use a set of linear segments to approximate the log term in (8) while ensuring that the linear approximation error does not exceed a specific threshold . Subsequently, the nonlinear constraints in OPT are replaced by a set of linear constraints. Denote the linearized optimization problem as OPT-R, which is a mixed-integer linear problem (MILP). Since MILP problems are relatively easier to solve than MINLP problems, we can efficeintly apply a solver such as CPLEX [4] to obtain a solution efficiently. We will show that solving OPT-R gives us a near-optimal solution to the original problem OPT. Denote γ as the desired performance gap for the near-optimal solution, i.e., the difference in the objective values between the optimal solution and the near-optimal solution to OPT. We analyze the relationship between the performance gap γ and the linear approximation error  (see details in Section III-B). Specifically, for a desired performance gap γ, we compute the maximum allowed linear approximation error , and accordingly, we derive the linear approximation constraints and construct OPT-R (see details in Section III-A). The solution to OPT-R then provides a near-optimal solution with the performance guarantee γ. We summarize the above steps in Fig. 1, and we provide details for the steps in the remainder of this section. A. Piece-wise Linear Approximation

f ∈F

To simplify notation, we denote p l hl . ηBl

(k)

ml

(k)

=

(k−1)

ln(1 + sl ) − ln(1 + sl (k) sl



(k−1) sl

(11)

Then, the nonlinear term in (10) can be written as ln(1 + sl ). The range of sl is [0, smax ], with smax = (Pmax hl )/(ηBl ). l l

)

(12)

.

(k)

Denote gl (sl ) as the k-th linear approximation segment (see Fig. 3), which can be represented as follows:     (k) (k) (k−1) (k−1) + ln 1 + sl , gl (sl ) = ml · sl − sl (k−1)

We can rewrite the nonlinear constraint in (8) as follows:  p l · hl Bl ln(1 + rl (f ) ≤ ). (10) ln 2 ηBl

sl ≡

The essence of our proposed piece-wise linear approximation is to use a set of consecutive linear segments to approximate ] (see Fig. 2). Denote  as the ln(1 + sl ) for sl ∈ [0, smax l maximum allowed error for this linear approximation and let Kl be the number of linear segments needed to meet this error (k) requirement (Kl will be determined later). Denote sl , k = 0, 1, . . . , Kl as the sl -axis values of the endpoints for these K (0) (K ) . segments, with sl ≡ 0 and sl l ≡ smax l A naive approach to generate a linear approximation is to (k) ]. have sl , k = 0, . . . , Kl , evenly distributed between [0, smax l When setting Kl sufficiently large, the linear approximation error requirement will be satisfied. Although this approach is straightforward and easy to implement, it will generate too many linear segments to approximate ln(1 + sl ). Note that the derivative of ln(1 + sl ) decreases as sl increases. This motivates us to enlarge the size of an interval as sl increases. Thus, we want to pursue an algorithm that optimally ]. By “optimally”, we divides the Kl intervals within [0, smax l refer to finding the minimum Kl such that the maximum approximation error of each line segment is no more than . (k) Denote ml as the slope of the k-th linear segment, i.e.,

for sl

(k)

≤ sl ≤ sl . (0)

(13)

(K )

Our algorithm computes the values of sl , . . . , sl l sequentially (for a given ) based on Algorithm 1 as follows: (0) Algorithm 1: Initialization: k := 0 and sl := 0. 1) k := k + 1. (k) 2) Compute ml that satisfies (k)

(k)

(k−1)

− ln(ml ) + ml (1 + sl (k)

(k)

3) With ml , compute sl

(k−1)

) − 1 − ln(1 + sl

that satisfies (12).

) = . (14)

JIANG et al.: THROUGHPUT MAXIMIZATION FOR MULTI-HOP WIRELESS NETWORKS WITH NETWORK-WIDE ENERGY CONSTRAINT

1259

(k)

4) If sl < smax , go to Step 1. l (K ) . 5) Kl := k; sl l := smax l (K ) 6) Update ml l using (12). (k)

ln(1 + sl )

(k)

The values of ml in (14) and sl in (12) can be solved by numerical methods such as the bisection method or Newton’s method [19, Chapter 2]. Our linear approximation method (Algorithm 1) satisfies the linear approximation error requirement with the minimum number of linear segments to approximate ln(1 + sl ) for sl ∈ [0, smax ]. We formally state these claims in the following two l lemmas. Lemma 1: For the piece-wise linear approximation generated by Algorithm 1, the maximum approximation error of each linear segment is at most .

g l k ( sl ) (

( k −1)

sl

(k)

Proof Denote l as the maximum linear approximation error for the k-th linear segment, i.e.,     (k) (k) + sl ) − gl (sl ) max l = ln(1 (k−1) (k) ≤sl ≤sl

sl

=

max

(k−1)

sl

(k)

≤sl ≤sl

 (k) ln(1 + sl ) − gl (sl ) ,

where the equality holds since ln(1+sl ) is a concave function of sl and all linear segments lie beneath the ln(1 + sl ) curve. Consider the k-th linear segment. Referring to Fig. 3, we (k) can move gl (sl ) upward until it is tangential to the ln(1+sl ) curve. It is easy to see (by differentiating the above concave function and setting to zero) that the tangential point achieves (k) (k) the maximum approximation error l . Denote sˆl as the sl -axis value of that tangential point. Since the derivative of (k) 1 , we have 1(k) = ml , i.e, ln(1 + sl ) is 1+s l 1+ˆ sl

(k)

sˆl

1

=

(k)

ml

− 1,

(15)

(k)

(k)

where ml is the slope of the linear segment gl (sl ). (k) Therefore, the maximum approximation error l can be written as: (k)

l

(k)

(k)

(k) sˆl )

(k) [ml

(k)

= ln(1 + sˆl ) − gl (ˆ sl ) = ln(1 +

1

= ln 1 + −



(k)

ml

(k) ml

·

(k)



·



(k−1) sl )

+ ln(1 +

(k−1) sl )]

−1

(k)

ml





1

−1−

(k)

(k−1) sl (k−1)

= − ln(ml ) + ml (1 + sl

+ ln(1 +

(k−1) ) sl (k−1)

) − 1 − ln(1 + sl

The proof of Lemma 2 is given in the appendix. With the proposed piece-wise linear approximation of ln(1 + sl ), Constraint (8) can be replaced by the following set of constraints:  Bl (k) g (sl ) rl (f ) ≤ (k = 1, . . . , Kl , l ∈ L) , ln 2 l f ∈F

(k)

where sl and gl (sl ) are given by (11) and (13), respectively. Substituting (11) and (13) into the above equation, we have       Bl (k) pl hl (k−1) (k−1) rl (f ) ≤ − sl + ln 1 + sl ml ln 2 ηBl f ∈F

(k = 1, . . . , Kl , l ∈ L) .

Lemma 2: For a given approximation error bound  for each linear segment, Algorithm 1 minimizes the number of linear ]. segments to approximate ln(1 + sl ) for sl ∈ [0, smax l

(16)

By replacing the nonlinear constraints in (8) with the set of linear constraints in (16), we obtain the following revised formulation for OPT, which we denote as OPT-R:  w(f )r(f ) OPT-R: max f ∈F

Link power constraint: (1) Node power constraint: (2) Flow balance: (3), (4) Linearized link flow constraint: (16) Total network energy constraint: (9) Variables yl ∈ {0, 1}, pl, rl (f ), r(f ) ≥ 0 (l ∈ L, f ∈ F ) .

),

where the second equality holds due to (13) and the third equality holds due to (15). (k) (k) (k−1) In Algorithm 1, we set − ln(ml )+ ml (1 + sl )− 1 − (k−1) ln(1 + sl ) = . Thus, the maximum linear approximation error for the k-th linear segment is . This result holds for all k = 1, · · · , Kl . This completes the proof. 

sl

(k )

sl

Fig. 3. An illustration of the maximum approximation error for the k-th linear segment.

s.t.

(k) (ˆ sl

(k )

s$ l

)

We have the following lemma on the relationship between OPT-R and OPT. Lemma 3: A feasible solution to OPT-R is a feasible solution to OPT. The proof of Lemma 3 is given in the appendix. B. A Near-Optimal Solution OPT-R is a mixed-integer linear program (MILP) and can be solved effectively by a commercial solver such as CPLEX [4]. We now provide a bound for the gap between the optimal

1260

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 3, MARCH 2013

objective values of OPT and OPT-R, despite that the optimal objective value of OPT is not available. To proceed, we need the following notation. For a given power assignment (yl , pl ) to OPT (i.e., satisfying Constraints (1), (2), (9)), define x ¯ = (¯ r (f ), r¯l (f ), yl , pl ) as a feasible solution to OPT, where (¯ r (f ), r¯l (f )) is the optimal solution to the following linear program (LP). OPT(yl , pl ) :  w(f )r(f ) max f ∈F

s.t.



rl (f ) = r(f ) (f ∈ F , i ∈ N , i = s(f ))

l∈LOut i



rl (f ) =

l∈LOut ,l=(i,s(f )) i





rl (f )

l∈LIn i ,l=(d(f ),i)

(f ∈ F , i ∈ N , i = s(f ), d(f )) rl (f ) ≤ c¯l (l ∈ L)

f ∈F

rl (f ), r(f ) ≥ 0 (l ∈ N , f ∈ F ) , l ·hl ). Note that OPT(yl , pl ) is an LP where c¯l = Bl log2 (1 + pηB l once we fix the power variables in OPT to the values (yl , pl ). For a feasible solution x ¯ = (¯ r (f ), r¯l (f ), yl , pl ) to OPT, we define a feasible solution x† = (r† (f ), rl† (f ), yl , pl ) to OPT-R as follows. In x† ≡ (r† (f ), rl† (f ), yl , pl ), we let (r† (f ), rl† (f )) be the optimal flow routing solution to OPT-R for the given (yl , pl ). That is, (r† (f ), rl† (f )) is the optimal solution to the following LP in which the power variables in OPT-R are fixed at the given values (yl , pl ).

OPT-R(yl , pl ) :  w(f )r(f ) max 

rl (f ) = r(f ) (f ∈ F , i ∈ N , i = s(f ))

l∈LOut i



 f ∈F



rl (f ) =

l∈LOut ,l=(i,s(f )) i

Proof Note that z¯ is the optimal objective value of OPT(yl , pl ) and z † is the optimal objective value of OPTR(yl , pl ). Consider the dual problems of OPT(yl , pl ) and OPTR(yl , pl ), denoted by D(yl , pl ) and D-R(yl , pl ), respectively. Note that D(yl , pl ) and D-R(yl , pl ) have the same constraints, but different objective functions. Denote the dual variables corresponding to the first group of constraints in OPT(yl , pl ) and OPT-R(yl , pl ) as u(f ), f ∈ F . Denote the dual variables corresponding to the second group of constraints in OPT(yl , pl ) and OPT-R(yl , pl ) as vi (f ), f ∈ F , i ∈ N , i = s(f ), d(f ). Denote the dual variables corresponding to the third group of constraints in OPT(yl , pl ) and OPT-R(yl , pl ) as ql , l ∈ L. Then, D(yl , pl ) can be written as follows:  min c¯l ql l∈L

s.t. − u(f ) ≥ w(f ) (f ∈ F ) u(f ) − vj (f ) + ql ≥ 0 (l ≡ (s(f ), j) ∈ L, j = d(f ), f ∈ F ) vi (f ) − vj (f ) + ql ≥ 0 (l ≡ (i, j) ∈ L, i = s(f ), i = d(f ), j = d(f ), f ∈ F ) vi (f ) + ql ≥ 0 (l ≡ (i, d(f )) ∈ L, f ∈ F ) u(f ), vi (f ) unrestricted, ql ≥ 0 (f ∈ F , i ∈ N \{s(f ), d(f )}, l ∈ L),

f ∈F

s.t.

gap between the optimal objective valuesof OPT and OPT-R is also bounded by ln2 maxf ∈F {w(f )} l∈L Bl . We find that this gap can be characterized in the dual domain to Problems OPT(yl , pl ) and OPT-R(yl , pl ). Lemma 4: For given (yl , pl ), denote z¯ and z † as the objective values of the solutions x ¯ (to OPT) and Then we have z¯ − z † ≤ x† (to OPT-R), respectively.   l∈L Bl . ln 2 maxf ∈F {w(f )}

rl (f )

l∈LIn i ,l=(d(f ),i)

where vi (f ) ≡ u(f ) if i ≡ s(f ) in the last dual inequality constraint. The dual problem D-R(yl , pl ) can be written as  † cl ql D-R(yl , pl ): min l∈L

(f ∈ F , i ∈ N , i = s(f ), d(f )) rl (f ) ≤

c†l

(l ∈ L) ,

where c†l is a linear approximation of link l’s capacity given the transmission power pl . Remark 1: Recall that we use Constraint (16) to replace Constraint (8) in OPT-R. When link l’s power is fixed at pl , we can determine which line segment is involved in the linear approximation of ln(1+sl ). Suppose that the k-th linear (k−1) (k) l ·hl segment is used, i.e., sl ≤ pηB ≤ sl . Then, link l’s l (k)

pl ·hl Bl approximated capacity can be written as c†l = ln 2 ·gl ( ηBl ).  To quantify the performance gap between our solution to OPT-R and the optimal solution to OPT, we will first show that for any feasible power assignment (pl , yl ), the gap between the objective values  corresponding to x ¯ and x† is at most  l∈L Bl . Then, we will show that the ln 2 maxf ∈F {w(f )}

s.t. Same constraints as D(yl , pl ). If (ql∗ , l ∈ L) is (part of) an optimal solution to D-R(yl , pl ), then since both D(yl , pl ) and D-R(yl , pl ) have the same feasible region, we have   †  c¯l ql∗ − cl ql∗ = (¯ cl − c†l )ql∗ . z¯ − z † ≤ l∈L

l∈L

l∈L

Note that the gap between c¯l and c†l is Bl , ln 2 since the maximum error of our linear approximation is . Thus, we have   z¯ − z † ≤ Bl ql∗ . (17) ln 2 c¯l − c†l ≤

l∈L

By the marginal rate of change interpretation of dual variables [2], ql∗ is bounded above by the largest possible change

JIANG et al.: THROUGHPUT MAXIMIZATION FOR MULTI-HOP WIRELESS NETWORKS WITH NETWORK-WIDE ENERGY CONSTRAINT

in the optimal objective value of Problem OPT-R(yl , pl ) with respect to the right-hand side c+ l . But since a small marginal Δ-change (say, increase) in the capacity of any link can at most push an extra Δ units of flows between sources and destinations, and thus increase the objective value by at most maxf ∈F {w(f )}, we have that ql∗ ≤ max{w(f )} .

(18)

f ∈F

Combining (17) and (18) gives us     max{w(f )} z¯ − z † ≤ Bl max{w(f )} = Bl . f ∈F ln 2 ln 2 f ∈F l∈L

l∈L

objective optimization problem OPT. In this section, we go one step further. We are interested in maximizing network throughput while minimizing energy consumption. We cast this problem as a multicriteria optimization problem with two objectives. Mathematically, this problem can be written as follows:  w(f )r(f ) MP: max f ∈F

min s.t.

l∈L

∗ zR

as the optimal objective value of OPT-R. Since Denote zR is the objective value of a feasible solution to OPT-R while ∗ is the optimal objective value of OPT-R, we have zR ∗ ≥ zR . zR

(20)

∗ Combining (19)  and (20), we have z ∗ − zR maxf ∈F {w(f )} l∈L Bl .

 ln 2

≤ 

Based on Theorem 1, the following algorithm prescribes a near-optimal solution to OPT with a performance guarantee. Algorithm 2: Input: Given a desired performance gap γ for the solution to OPT. 1) Compute  based on   max{w(f )} Bl = γ. (21) ln 2 f ∈F l∈L

(k) ml

(k) sl

2) Compute and by Algorithm 1. (k) (k) 3) Construct OPT-R based on ml and sl . 4) Solve OPT-R optimally using an MILP package (e.g., CPLEX). Upon the completion of Algorithm 2, we have a near-optimal solution to OPT with a guaranteed performance bound (no more than γ from the optimal objective value). IV. M AXIMIZING T HROUGHPUT AND M INIMIZING N ETWORK - WIDE E NERGY In the previous section, we have shown how to maximize network throughput while satisfying a given total network energy budget. The problem was formulated as a single

(pl + yl Pd )

Link power constraint: (1) Node power constraint: (2) Flow balance: (3), (4) Link flow constraint: (8)

We are now ready to characterize the performance gap between the optimal objective values of OPT-R and OPT. Theorem 1: The gap between the optimal objective values of OPT  and OPT-R is no more than  max {w(f )} f ∈F l∈L Bl . ln 2 Proof Denote x∗ and z ∗ as the optimal solution and the optimal objective value of OPT, respectively. From Lemma 4, ¯, we know that there exists since x∗ is a particular case of x a feasible solution xR to OPT-R corresponding to x∗ such that the performancegap between x∗ and xR is at most  l∈L Bl . Denote zR as the objective ln 2 maxf ∈F {w(f )} value of the solution xR to OPT-R. Then, we have   z ∗ − zR ≤ max{w(f )} Bl . (19) ln 2 f ∈F

 l∈L



This completes the proof.

1261

Variables yl ∈ {0, 1}, pl, rl (f ), r(f ) ≥ 0 (l ∈ L, f ∈ F ). As we can see, minimizing the network-wide energy consumption and maximizing the network throughput (U) are two conflicting objectives. For such a problem, it is in general not possible to find a single feasible solution that is optimal for both objectives at the same time. For example, when P is minimized (i.e., equals 0), U is also 0 but is not maximized. Therefore, it is important to clarify what we mean by optimal solutions. In this paper, we are interested in finding so-called weakly Pareto-optimal solutions [6]. Such solutions are desirable in the sense that it is impossible to improve the performance of both objectives simultaneously. Specifically, we say that (P ∗ , U ∗ ) is a weakly Pareto-optimal solution to Problem MP if there does not exist another solution to Problem MP with (P, U ) such that P < P ∗ and U > U ∗ . To find weakly Pareto-optimal solutions, we transform the multicriteria optimization problem into a single objective optimization problem. This can be done by moving the second  objective (i.e., l∈L (pl + yl Pd ) ) into the constraints as follows:  w(f )r(f ) SP(Pnet ): max f ∈F

s.t.



(pl + yl Pd ) ≤ Pnet

l∈L

Link power constraint: (1) Node power constraint: (2) Flow balance: (3), (4) Link flow constraint: (8) Variables yl ∈ {0, 1}, pl, rl (f ), r(f ) ≥ 0 (l ∈ L, f ∈ F ). We see that this single objective optimization problem is precisely the same as OPT that we studied earlier. For a fixed value of Pnet , solving SP(Pnet ) will give us one weakly Pareto-optimal point for Problem MP [6]. By varying Pnet max from 0 to Pnet = |L| · (Pmax + Pd ), we can obtain all weakly Pareto-optimal points. These points provide a mapping from the network-wide energy budget Pnet to the maximum

1262

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 3, MARCH 2013

network throughput U , which we denote as π : Pnet → U . This mapping U = π(Pnet ) provides an optimal throughputenergy curve, which characterizes how the maximum network throughput changes as the total network-wide energy consumption rate varies. This curve is useful for network operators to glean a holistic view of the entire optimal tradeoff curve and decide which point to choose so as to meet their specific needs. There are several interesting properties about this optimal throughput-energy curve U = π(Pnet ), as given in Property 1 below. Property 1: The optimal throughput-energy curve U = π(Pnet ) has the following properties: 1) π(Pnet ) is a nondecreasing function of Pnet . 2) π(Pnet ) has a starting point (Pstart , 0), i.e., π(Pnet ) = 0 for Pnet ≤ Pstart and π(Pnet ) > 0 for Pnet > Pstart . 3) There is a saturation point (Psat , Usat ) for π(Pnet ), i.e., π(Pnet ) = Usat for Pnet ≥ Psat . Proof We prove each of these properties as follows. (1) (2) (1) 1) Assume Pnet < Pnet . We need to show that U (Pnet ) ≤ (2) (1) (2) U (Pnet ). Note that U (Pnet ) and U (Pnet ) are the opti(1) (2) mal objectives of SP(Pnet ) and SP(Pnet ), respectively. (1) (2) (1) Since Pnet < Pnet , the feasible region of SP(Pnet ) is (2) contained within the feasible region of SP(Pnet ). Thus, (1) (2) we have U (Pnet ) ≤ U (Pnet ). 2) Such a starting point exists because when a link is active, it must consume a constant power Pd . For a session to have positive throughput, it must activate all the links along the path that are used by this session for transporting data. Thus, Pstart can be determined by the session that uses the minimum number of hops from its source to its destination. Denote by mf the minimum possible hops for session f . Then, Pstart can be written as Pstart = Pd · min{mf : f ∈ F }. 3) We prove this property by construction. We first compute the saturation point (Psat , Usat ) without the network-wide energy constraint. That is, we solve the following optimization problem:  max w(f )r(f ) f ∈F

s.t. Constraints (1), (2), (3), (4), (8). yl ∈ {0, 1}, pl, rl (f ), r(f ) ≥ 0 (l ∈ L, f ∈ F ) . The optimal objective value of the above problem is Usat . Usat cannot be infinite, since the transmission power at a node has a threshold Pmax , which guarantees that the link capacity is finite, and hence the throughput is finite. Once we obtain Usat , we can determine the minimum energy Psat that achieves Usat by solving the following optimization problem:  min (pl + yl Pd ) l∈L

s.t.



w(f )r(f ) = Usat

f ∈F

Constraints (1), (2), (3), (4), (8). yl ∈ {0, 1}, pl, rl (f ), r(f ) ≥ 0 (l ∈ L, f ∈ F ) .

π ( Pnet )

U sat

Psat

Pstart

Pnetmax Pnet

Fig. 4. An illustration of optimal throughput-energy curve.

Note that Psat is the minimum energy consumption level that achieves Usat . When Pnet is greater than this value, the maximum network throughput remains as Usat , i.e.,  U = π(Pnet ) becomes flat for Pnet ≥ Psat . Based on Property 1, Fig. 4 illustrates a typical optimal throughput-energy curve for a multi-hop wireless network. V. N UMERICAL R ESULTS In this section, we present some numerical results to illustrate our approach in Sections III and IV. A. Simulation Settings We consider the following network topologies: • • •

a 50-node network deployed in a 1000 × 1000 square area; a 100-node network deployed in a 1500 × 1500 square area; a 200-node network deployed in a 2000 × 2000 square area.

The topologies of the 50-node, 100-node, and 200-node networks are shown in Figures 5, 6, and 7, respectively. We assume that all units are normalized with appropriate dimensions. We assume that the maximum transmission range is 200 and that the maximum transmission power is Pmax = 2. We assume a node device power consumption of Pd = 0.2, unless specified otherwise.2 The channel bandwidth is Bl = 1 for all links and the channel gain is hl = d−4 l , where dl is the distance between link l’s transmitting node and receiving node. B. Results for the 50-node Network Within this network, we assume that there are |F | = 5 user sessions, with the source and destination nodes for each session chosen randomly. Table II lists the source node, destination node, and weight for each session in the network. 2 In wireless mesh networks, the peak transmission power P max is usually several Watts (2-3W), i.e., transmission power is between 0 and this Pmax value, and the constant device power Pd is usually several hundreds mWatts (100-300 mW).

JIANG et al.: THROUGHPUT MAXIMIZATION FOR MULTI-HOP WIRELESS NETWORKS WITH NETWORK-WIDE ENERGY CONSTRAINT

1000

2000

38

28

11 35

138

41

900

1800 32

1600

10

36 39

23

700 17

1 40

26

600 22 10

37

2

400

800

42

24

9

600

49

300

96 191

6 15

3

18

21

100

0

100

53

0

67

200

300

19

7

400

20 600

500

700

800

900

0

1000

Fig. 5. The topology for a 50-node network.

6

51 127

190 128 163

76

24

104

132 130

55

600

23

800

141

42

165 45

192

1000

37

170 175 3

1200

26 64 166 59

11 77

160 107 85 126

115

21 153 180

71

123 66 125 193 16

129

142

139 58 89

182 152 28

90 79

120

140 118

63

167

27 189

35

177

81

112

62

69 147

114

25 188

117

80 108

400

174

198

78

52

151

41

50

164

87

156

88

158101

29

113

32 47

146 36

1400

1600

0.7

0.8

135

91 161

154 2

149 200 194

150

1800

2000

Fig. 7. The topology for a 200-node network. 35

1500 92 79

88 59 63

69

40

18

30

89

27

17 45

78

43

85

15

86

21

95 37

26

1000 72

90

4

8 66

98

41 2

1

94

7

83

73

23

11

42

52

50

77

65

87

74

71

39

100 48 67

0.3

0.4 0.5 0.6 Device Power

0.9

1

13

Fig. 8. Network throughput as a function of the device power Pd for the 50-node network.

91

57

35 34

19 10

82

51 99

96

6

76

56 25

20

75

38

29

33

62

93 0

0.2

54

64

16 49

0.1

9

97

31

24

10

0 0

3 68

53

15

5

55

36

61

20

14

28 60

84

22

25

12

46

500

30

58

47

Network Throughput

5

81

0

15

84

200

109

82 74

124

159

131

145 44

12

44 5

0

200

12

199

116 168

186

72

400

16

43

8 46

171

94

185 111

178

33

47

13

83

184

103

34

187

57

75

20

97

4

106

162 4

183

176

1000

31

105

48

133

13

30

95

22

38

143 173 119 155

197 157

65

18

137

49

14 40

45 48

200

8

179

1200

25

500

195

33

27

19

1 148

100 5

122 60

98 9

43

73

93

39

46 31

169

1400

30

181 121

92 172

54

144102 61 56 196 86 134 136 7 68 70

17

99

50 29

800 14

110

34

1263

500

1000

70 80

44

32 1500

Fig. 6. The topology for a 100-node network.

1) Near-Optimal Solution for OPT: In this case study, we assume that the maximum network-wide energy consumption rate is given by Pnet = 40. We set the maximum acceptable performance gap between the optimal objective values of OPT and the linear approximation OPT-R as γ = 0.1, and apply Algorithm 2. Based on (21), we compute  = γ ln 2  maxf ∈F {w(f )} l∈L Bl = 0.000393, and thus compute the piece-wise linear approximation according to Algorithm 1. We then use CPLEX to solve OPT-R. The resulting maximum network throughput is U = 22.32. The achieved session data rates are r1 = 4.53, r2 = 6.45, r3 = 9.06, r4 = 4.13, and r5 = 6.79. Our algorithm gives power control and flow routing solutions for the network. We list the power assignment for each active link in Table III, and the flow routing results in Table IV. The above numerical results were obtained when Pd = 0.2.

TABLE II E ACH SESSION ’ S SOURCE NODE , DESTINATION NODE , AND WEIGHT FOR THE 50- NODE NETWORK . Session f 1 2 3 4 5

Source node s(f ) 10 35 5 43 29

Dest. node d(f ) 35 21 23 14 7

Weight w(f ) 0.5 0.9 0.7 0.6 0.8

We now vary Pd from 0 to 1 and study how the network throughput changes. The resulting curve is shown in Fig. 8. We can see that the device power has a significant impact on network throughput. Even when Pd changes from 0 to 0.1, the network throughput decreases from 32.18 to 26.30. This confirms our hypothesis that the device power cannot be neglected in the problem formulation. 2) Optimal Throughput-Energy Curve: For the same 50node network instance, we characterize its optimal throughputenergy curve based on our approach in Section IV. The optimal throughput-energy curve is depicted in Fig. 9, which verifies all three properties as stated in Property 1. As shown in the figure, the curve is nondecreasing. The network throughput

1264

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 3, MARCH 2013

TABLE III P OWER ASSIGNMENT FOR EACH ACTIVE LINK IN THE FINAL SOLUTION FOR THE 50- NODE NETWORK . Link 1 → 27 2 → 45 3 → 13 4 → 22 5→8 7 → 15 8 → 15 9 → 43 10 → 42 10 → 9 11 → 32 14 → 22 15 → 7 17 → 14 22 → 14 25 → 37 27 → 10 29 → 34 30 → 25 33 → 43 34 → 11 36 → 30 39 → 27 41 → 14 42 → 10 43 → 9 45 → 22 45 → 2 47 → 24

Power 0.1832 0.2003 0.1750 0.1493 0.1835 0.4338 0.2590 0.1589 0.2853 0.1919 0.1568 0.2455 0.6236 0.1447 0.2639 0.1337 0.3217 0.2134 0.0824 0.5296 0.1407 0.4168 0.3252 0.2582 0.2679 0.2374 0.0387 0.1409 0.5701

Link 1 → 23 2 → 24 3→6 4 → 13 5→7 7→8 8→7 9 → 10 10 → 27 10 → 1 13 → 4 15 → 47 17 → 45 22 → 45 24 → 47 26 → 32 27 → 1 29 → 32 32 → 36 34 → 35 35 → 41 37 → 33 39 → 23 42 → 47 43 → 47 44 → 5 45 → 17 47 → 43 47 → 15

Power 0.5066 0.0414 0.0305 0.2396 0.0283 0.1368 0.1275 0.2867 0.3039 0.3047 0.4706 0.2349 0.1398 0.0477 0.4010 0.3546 0.1171 0.0846 0.0807 0.4374 0.3464 0.1863 0.0894 0.0167 0.4785 0.3346 0.3761 0.4451 0.2655

Link 1 → 17 3 → 44 4 → 45 5 → 44 6→4 8 → 44 8→3 10 → 47 10 → 26 11 → 34 13 → 3 15 → 8 17 → 23 22 → 17 24 → 2 27 → 39 29 → 39 29 → 1 32 → 11 34 → 29 35 → 34 39 → 29 39 → 17 42 → 15 43 → 21 44 → 3 45 → 4 47 → 42

Power 0.4910 0.2012 0.1987 0.2120 0.5651 0.0740 0.5422 0.2002 0.0103 0.2576 0.0891 0.5184 0.0303 0.3894 0.0588 0.4766 0.5384 0.6409 0.2872 0.2962 0.3822 0.0862 0.5201 0.1460 0.4445 0.5413 0.1229 0.0347

TABLE IV F LOW ROUTING RESULTS FOR THE 50- NODE NETWORK . Session f 1

2

3

4

5

40

Flow rate on each link attributed to session f r10→27 (1) = 2.59, r10→26 (1) = 1.94, r11→34 (1) = 1.94 r26→32 (1) = 1.94, r27→39 (1) = 2.59, r29→34 (1) = 2.59 r32→11 (1) = 1.94, r34→35 (1) = 4.53, r39→29 (1) = 2.59 r1→27 (2) = 1.54, r2→24 (2) = 2.10, r9→43 (2) = 1.54 r10→9 (2) = 1.54, r11→32 (2) = 1.35, r14→22 (2) = 2.10 r22→45 (2) = 2.10, r24→47 (2) = 2.10, r25→37 (2) = 2.81 r27→10 (1) = 1.54, r29→32 (2) = 1.46, r29→1 (1) = 1.54 r30→25 (2) = 2.81, r32→36 (2) = 2.81, r33→43 (2) = 2.81 r34→29 (1) = 2.99, r34→11 (2) = 1.35, r35→41 (1) = 2.10 r35→34 (2) = 4.34, r36→30 (1) = 2.81, r37→33 (1) = 2.81 r41→14 (1) = 2.10, r43→21 (1) = 6.45, r45→2 (1) = 2.10 r47→43 (1) = 2.10 r1→23 (3) = 2.10, r1→17 (3) = 0.32, r2→45 (3) = 0.32 r3→13 (3) = 2.99, r3→6 (3) = 2.59, r4→45 (3) = 2.75 r4→22 (3) = 2.83, r5→44 (3) = 1.70, r5→8 (3) = 3.07 r5→7 (3) = 4.29, r6→4 (3) = 2.59, r7→15 (3) = 1.94 r7→8 (3) = 2.35, r8→44 (3) = 1.70, r8→15 (3) = 1.54 r8→3 (3) = 2.18, r10→27 (3) = 1.54, r10→1 (3) = 1.62 r13→4 (3) = 2.99, r15→47 (3) = 3.48, r17→23 (3) = 6.23 r22→45 (3) = 0.32, r22→17 (3) = 2.51, r24→2 (3) = 0.32 r27→39 (3) = 0.73, r27→1 (3) = 0.81, r39→23 (3) = 0.73 r42→10 (3) = 3.15, r44→3 (3) = 3.40, r45→17 (3) = 3.40 r47→42 (3) = 3.15, r47→24 (3) = 0.32 r1→17 (4) = 1.94, r2→45 (4) = 2.18, r9→10 (4) = 1.94 r10→27 (4) = 1.94, r17→14 (4) = 1.94, r22→14 (4) = 2.18 r24→2 (4) = 2.18, r27→1 (4) = 1.94, r43→47 (4) = 2.18 r43→9 (4) = 1.94, r45→22 (4) = 2.18, r47→24 (4) = 2.18 r1→27 (5) = 1.78, r3→44 (5) = 2.18, r4→13 (5) = 2.18 r5→7 (5) = 2.18, r8→7 (5) = 2.26, r10→47 (5) = 1.38 r10→42 (5) = 3.24, r13→3 (5) = 2.18, r15→8 (5) = 2.26 r15→7 (5) = 2.35, r17→45 (5) = 2.18, r27→10 (5) = 4.61 r29→39 (5) = 5.02, r29→1 (5) = 1.78, r39→27 (5) = 2.83 r39→17 (5) = 2.18, r42→47 (5) = 2.26, r42→15 (5) = 0.97 r44→5 (5) = 2.18, r45→4 (5) = 2.18, r47→15 (5) = 3.64

U =36.14 sat

35

Network throughput U

30

25

20

15

10

5 P

start

0 0

P =106.20 sat

=1.0 50

max Pnet =431.20

100 Network energy consumption rate Pnet

Fig. 9. The optimal throughput-energy curve for the 50-node network, where the “\\” sign in the figure indicates nonlinear scale for Pnet ∈ [106.20, 431.20].

remains at zero when the network energy consumption rate is no greater than Pstart . For the starting point (Pstart , 0), since Session 1 needs at least 5 hops , we have Pstart = 5 · Pd = 1. For the saturation point (Psat , Usat ), we get (Psat , Usat ) = (106.20, 36.14). The network throughput ceases to increase and remains at 36.14 when the network energy consumption rate exceeds Psat = 106.20. C. Results for the 100-node Network For the 100-node network, we assume that there are |F | = 10 active sessions in the network, with each session’s source node, destination node, and weight given in Table V.

We assume that the maximum network-wide energy consumption rate is given by Pnet = 60. By employing our method, we obtain that the maximum network throughput is U = 34.49. The achieved session data rates are r1 = 9.68, r2 = 2.76, r3 = 7.07, r4 = 2.52, r5 = 9.40, r6 = 4.00, r7 = 2.30, r8 = 2.57, r9 = 7.82, and r10 = 3.39. The detailed results for power assignment and flow routing are given in Tables VI and VII, respectively. The above numerical results were obtained when Pd = 0.2. We also show in Fig. 11 how the throughput changes for the 100-node network with Pd = 0.2 as the device power varies.

D. Results for the 200-node Network For the 200-node network, we assume that there are |F | = 12 active sessions in the network, with each session’s source node, destination node, and weight given in Table VIII. We assume that the maximum network-wide energy consumption rate is given by Pnet = 160. By employing our method, we obtain that the maximum network throughput is U = 78.84. The achieved session data rates are r1 = 15.23, r2 = 10.27, r3 = 9.70, r4 = 11.84, r5 = 13.07, r6 = 1.86, r7 = 10.14, r8 = 2.67, r9 = 7.09, r10 = 1.04, r11 = 27.67, and r12 = 6.06. The detailed results for power assignment and flow routing are omitted to conserve space. The device power and throughput curve and the optimal throughput-energy curve follow a similar pattern as for the 50- and 100-node network, which are also omitted here for the sake of brevity.

JIANG et al.: THROUGHPUT MAXIMIZATION FOR MULTI-HOP WIRELESS NETWORKS WITH NETWORK-WIDE ENERGY CONSTRAINT

45

TABLE V E ACH SESSION ’ S SOURCE NODE , DESTINATION NODE , AND WEIGHT FOR THE 100- NODE NETWORK .

40

Network Throughput

35 30 25 20 15 10 5 0 0

0.1

0.2

0.3

0.4 0.5 0.6 Device Power

0.7

0.8

0.9

1

Fig. 10. Network throughput as a function of the device power for the 100node network. 45

U =40.09 sta

40

35

Network throughput U

30

25

20

15

10

5

Pstart=0.8 0

0

1265

Pmax=708.40

Psat=102.64 50

net

100 Network energy consumption rate P

net

Fig. 11. The optimal throughput-energy curve for the 100-node network, where the “\\” sign in the figure indicates nonlinear scale for Pnet ∈ [102.64, 708.40].

VI. C ONCLUSIONS This paper has explored problems associated with total network energy, an area that is of great significance to network operators but has not been well studied by the research community. Specifically, we examined the following two problems. In the first problem, we studied how to maximize network throughput under a network-wide energy constraint. We formulated this problem as a mixed-integer nonlinear program (MINLP) and proposed a near-optimal solution procedure with a guaranteed performance bound that is asymptotically optimal. In the second problem, we explored the joint optimization of both network throughput and energy consumption via a multicriteria optimization framework. We showed how to generate weakly Pareto-optimal solutions in order to characterize an optimal throughput-energy curve. In our study, we have considered the device power associated with an active link, which turns out to be a significant factor that affects throughput performance but has been overlooked in prior efforts. The results in this paper offer both theoretical solutions and practical insights to network operators when total energy consumption is of interest while maximizing network throughput.

Session f 1 2 3 4 5 6 7 8 9 10

Source node s(f ) 40 27 4 31 78 7 73 12 64 51

Dest. node d(f ) 26 17 55 41 100 83 91 10 38 56

Weight w(f ) 0.9 0.8 0.7 0.2 0.8 0.6 0.3 0.4 0.6 0.5

TABLE VI P OWER ASSIGNMENT FOR EACH ACTIVE LINK IN THE FINAL SOLUTION FOR THE 100- NODE NETWORK . Link 1 → 42 4 → 83 6 → 34 8 → 83 11 → 23 14 → 55 15 → 1 23 → 65 28 → 52 30 → 85 34 → 99 36 → 100 40 → 30 42 → 46 45 → 72 47 → 86 51 → 99 52 → 23 56 → 76 64 → 48 67 → 76 68 → 54 73 → 41 74 → 36 77 → 55 79 → 40 86 → 95 94 → 83 99 → 20

Power 0.2149 1.0234 0.2688 0.1404 0.3240 0.0315 1.0323 0.1818 0.0176 0.5012 0.1345 0.3526 0.8126 0.1153 1.5655 0.6319 0.8480 0.2692 0.0261 0.0627 1.4814 0.7710 0.3026 0.0155 0.3670 0.7875 0.0144 1.8608 0.3262

Link 2→7 4→8 7 → 74 8 → 11 12 → 71 14 → 3 18 → 89 23 → 41 28 → 39 30 → 43 34 → 67 39 → 68 41 → 26 42 → 36 46 → 94 47 → 17 52 → 65 54 → 10 60 → 28 65 → 77 67 → 34 71 → 14 73 → 14 76 → 56 78 → 45 83 → 11 89 → 79 94 → 46 99 → 6

Power 0.2222 0.9766 1.4991 0.2158 0.3392 0.5382 0.2942 0.2434 0.3859 0.2242 0.3060 0.3097 0.5198 0.9586 0.3396 0.4046 0.2639 0.7201 0.4521 0.4445 0.5186 0.0362 0.5069 0.0236 0.9702 0.0566 0.2912 0.1392 0.0390

Link 3 → 91 6 → 99 7 → 42 11 → 52 13 → 56 15 → 90 20 → 38 27 → 18 29 → 38 31 → 60 34 → 6 40 → 47 42 → 74 43 → 85 46 → 42 48 → 13 52 → 28 55 → 68 64 → 67 66 → 73 68 → 55 72 → 2 74 → 100 76 → 29 78 → 15 85 → 26 90 → 94 95 → 66

Power 0.5415 0.0232 0.3606 0.1615 1.6038 0.9677 2.0000 0.1185 1.5862 0.1188 0.1601 1.1874 0.9261 0.3057 0.0473 0.1070 0.0243 0.2972 0.3104 0.6573 0.3907 0.2333 0.3338 0.2422 0.1884 2.0000 0.1828 0.4048

In this study, we have employed orthogonal channels to simplify scheduling at the link layer. However, our proposed solution may also be extended to solve problems under more complex interference situations. For example, we could extend our approach to the interference models proposed in [15], [18]. In these models, the network was represented as a directed graph, where the vertices represent the nodes and the links represent the communication links. A node can only receive from or transmit to at most one node in any time-slot. Under such an interference model, we can introduce suitable binary variables and use linear constraints to characterize the node-exclusive interference relationship in the network. In this case, the problem formulation will still be an MINLP. It will have more linear constraints, but the same set of nonlinear constraints as those in the present paper (i.e., based on logarithmic functions for computing the link capacities). Therefore, we can likewise apply the linear approximation technique proposed herein to transform such an MINLP into an MILP and solve it thereby to derive a near-optimal solution.

1266

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 3, MARCH 2013 (K  )

TABLE VII F LOW ROUTING RESULTS FOR THE 100- NODE NETWORK . Session f 1 2

3

4

5

6 7 8

9

10

Flow rate on each link attributed to session f r30→85 (1) = 3.00, r30→43 (1) = 3.78, r40→47 (1) = 2.90 r40→30 (1) = 6.77, r41→26 (1) = 2.90, r43→85 (1) = 3.78 r47→86 (1) = 2.90, r66→73 (1) = 2.90, r73→41 (1) = 2.90 r85→26 (1) = 6.77, r86→95 (1) = 2.90, r95→66 (1) = 2.90 r18→89 (2) = 2.76, r27→18 (2) = 2.76, r40→47 (2) = 2.76 r47→17 (2) = 2.76, r79→40 (2) = 2.76, r89→79 (2) = 2.76 r4→83 (3) = 3.23, r4→8 (3) = 3.84, r8→83 (3) = 1.59 r8→11 (3) = 2.24, r11→52 (3) = 4.33, r11→23 (3) = 2.74 r23→65 (3) = 2.74, r28→39 (3) = 2.91, r39→68 (3) = 2.91 r52→65 (3) = 1.42, r52→28 (3) = 2.91, r65→77 (3) = 4.16 r68→55 (3) = 2.91, r77→55 (3) = 4.16, r83→11 (3) = 4.82 r23→41 (4) = 2.52, r28→52 (4) = 2.52, r31→60 (4) = 2.52 r52→23 (4) = 2.52, r60→28 (4) = 2.52 r1→42 (5) = 2.96, r2→7 (5) = 3.60, r7→74 (5) = 3.38 r7→42 (5) = 0.22 r15→90 (5) = 2.84, r15→1 (5) = 2.96 r36→100 (5) = 6.13, r42→74 (5) = 3.01, r42→36 (5) = 3.00 r45→72 (5) = 3.60, r46→42 (5) = 2.84, r72→2 (5) = 3.60 r74→100 (5) = 3.27, r74→36 (5) = 3.13, r78→45 (5) = 3.60 r78→15 (5) = 5.80, r90→94 (5) = 2.84, r94→46 (5) = 2.84 r7→42 (6) = 4.00, r42→46 (6) = 4.00, r46→94 (6) = 4.00 r94→83 (6) = 4.00 r3→91 (7) = 2.30, r14→3 (7) = 2.30, r73→14 (7) = 2.30 r12→71 (8) = 2.57, r14→55 (8) = 2.57, r54→10 (8) = 2.57 r55→68 (8) = 2.57, r68→54 (8) = 2.57, r71→14 (8) = 2.57 r6→99 (9) = 2.74, r13→56 (9) = 3.53, r20→38 (9) = 4.10 r29→38 (9) = 3.72, r34→99 (9) = 1.36, r34→6 (9) = 2.74 r48→13 (9) = 3.53, r56→76 (9) = 3.53, r64→67 (9) = 4.29 r64→48 (9) = 3.53, r67→76 (9) = 0.20, r67→34 (9) = 4.10 r76→29 (9) = 3.72, r99→20 (9) = 4.10 r6→34 (10) = 3.39, r34→67 (10) = 3.39, r51→99 (10) = 3.39 r67→76 (10) = 3.39, r76→56 (10) = 3.39, r99→6 (10) = 3.39

TABLE VIII E ACH SESSION ’ S SOURCE NODE , DESTINATION NODE , AND WEIGHT FOR THE 200- NODE NETWORK . Session f 1 2 3 4 5 6 7 8 9 10 11 12

Source node s(f ) 35 115 43 29 58 147 3 137 78 147 183 137

Dest. node d(f ) 21 23 114 7 25 99 62 17 65 99 162 17

Weight w(f ) 0.9 0.7 0.6 0.8 0.5 0.9 0.7 0.4 0.5 0.9 0.5 0.9

ACKNOWLEDGMENTS The work of Y.T. Hou and H.D. Sherali was supported in part by NSF grants 0925719 and 1064953. The work of W. Lou was supported in part by NSF grants 1156311 and 1156318. A PPENDIX Proof of Lemma 2 Our proof is based on contradiction. Assume that the number of linear segments that Algorithm 1 (k) generates is Kl , and sl , k = 0, . . . , Kl , are the corresponding sl -axis end-point values. Suppose that there is another piecewise linear approximation that needs Kl < Kl linear segments (K  ) (k) (0) ) being with tl ( k = 0, . . . , Kl , tl = 0 and tl l = smax l the corresponding sl -axis values at the end-points. (1) Since sl is the largest possible sl -axis value of the second (1) (1) end-point given the -tolerance, we have that tl ≤ sl . By (k) (k) induction, we can show that tl ≤ sl , k = 1, . . . , Kl . For

(K  )

k = Kl , we have tl l ≤ sl l . Furthermore, since Kl < (K  ) . Therefore, we conclude that Kl , we also have sl l < smax l (Kl ) (Kl ) (K  ) max tl ≤ sl < sl , which is a contradiction to tl l = smax . This completes the proof.  l Proof of Lemma 3 Note that the only difference between OPT and OPT-R is with respect to the link capacity constraints. Each link capacity constraint for link l in OPT is replaced by a set of linear constraints in OPT-R. Since these linear constraints are generated by the piece-wise linear segments lying beneath the log curve, the feasible region of OPT-R is contained within the feasible region of OPT. Thus, a feasible solution to OPT-R is also a feasible solution to OPT.  R EFERENCES [1] M. Andrews and M. Dinitz, “Maximizing capacity in arbitrary wireless networks in the SINR model: complexity and game theory,” in Proc. 2009 IEEE INFOCOM, pp. 1332–1340. [2] M. S. Bazaraa, J. J. Jarvis, and H. D. Sherali, Linear Programming and Network Flows, 4th edition. John Wiley & Sons Inc., 2010. [3] L. Chen, S. H. Low, M. Chiang, and J. C. Doyle, “Cross-layer congestion control, routing and scheduling design in ad hoc wireless networks,” in Proc. 2006 IEEE INFOCOM. [4] IBM ILOG CPLEX Optimizer, http://www-01.ibm.com/software/integration/optimization/cplexoptimizer/. [5] S. Cui, A. J. Goldsmith, and A. Bahai, “Energy-constrained modulation optimization,” IEEE Trans. Wireless Commun., vol. 4, no. 5, pp. 2349– 2360, Sep. 2005. [6] M. Ehrgott, Multicriteria Optimization, 2nd edition. Springer-Verlag, 2010. [7] R. Fletcher and S. Leyffer, “Solving mixed integer programs by outer approximation,” Mathematical Programming, vol. 66, no. 1–3, pp. 327– 349, 1994. [8] O. K. Gupta and A. Ravindran, “Branch and bound experiments in convex nonlinear integer programming,” Management Science, vol. 31, no. 12, pp. 1533–1546, 1985. [9] S. Huang, X. Liu, and Z. Ding, “Distributed power control for cognitive user access based on primary link control feedback,” in Proc. 2010 IEEE INFOCOM, pp. 1280–1288. [10] M. R. Garey and D. S. Johnson, Computers and Intractability: A Guide to the Theory of NP-completeness. W. H. Freeman and Company, pp. 245–248, 1979. [11] A. M. Geoffrion, “A generalized Benders’ decomposition,” J. Optimization Theory and Applications, vol. 10, no. 4, pp. 237–260, 1972. [12] C. Jiang, Y. Shi, Y. T. Hou, and W. Lou, “Cherish every Joule: maximizing throughput with an eye on network-wide energy consumption,” in Proc. 2012 IEEE INFOCOM, pp. 1934–1941. [13] M. Kodialam and T. Nandagopal, “Characterizing achievable rates in multi-hop wireless mesh networks with orthogonal channels,” IEEE/ACM Trans. Networking, vol. 13, no. 4, pp. 868–880, Aug. 2005. [14] B. Li, Y. T. Hou, J. Liu, G. D. Nguyen, and T. F. Znati (Guest Editors), ACM/Kluwer Mobile Networks and Applications, vol. 10, no. 6, Dec. 2005. [15] L. Lin, X. Lin, and N. B. Shroff, “Low-complexity and distributed energy minimization in multihop wireless networks,” IEEE/ACM Trans. Networking, vol. 18, no. 2, pp. 501–514, Apr. 2010. [16] I. Maric and R. D. Yates, “Cooperative multihop broadcast for wireless networks,” IEEE J. Sel. Areas Commun., vol. 22, no. 6, pp. 1080–1088, Aug. 2004. [17] G. W. Miao, N. Himayat, and G. Y. Li, “Energy-efficient link adaptation in frequency-selective channels,” IEEE Trans. Commun., vol. 58, no. 2, pp. 545–554, Feb. 2010. [18] M. J. Neely, “Energy optimal control for time varying wireless networks,” IEEE Trans. Inf. Theory, vol. 52, no. 7, pp. 2915–2934, July 2006. [19] S. Rosloniec, Fundamental Numerical Methods for Electrical Engineering. Springer, 2008. [20] Y. Shi, Y. T. Hou, S. Kompella, and H. D. Sherali, “Maximizing capacity in multi-hop cognitive radio networks under the SINR model,” IEEE Trans. Mobile Computing, vol. 10, no. 7, pp. 954–967, July 2011.

JIANG et al.: THROUGHPUT MAXIMIZATION FOR MULTI-HOP WIRELESS NETWORKS WITH NETWORK-WIDE ENERGY CONSTRAINT

[21] J. Tang, G. Xue, C. Chandler, and W. Zhang, “Link scheduling with power control for throughput enhancement in multihop wireless networks,” IEEE Trans. Veh. Technol., vol. 55, no. 3, pp. 733–742, May 2006. [22] T. Westerlund and F. Pettersson, “An extended cutting plane method for solving convex MINLP problems,” Computers Chem. Eng., vol. 19, supplement 1, pp. 131–136, 1995. [23] J. E. Wieselthier, G. D. Nguyen, and A. Ephremides, “Energy-aware wireless networking with directional antennas: the case of session-based broadcasting and multicasting,” IEEE Trans. Mobile Computing, vol. 1, no. 3, pp. 176–192, July–Sept. 2002.

Canming Jiang (S’08) received the B.E. degree in Electrical Engineering and Information Science from the University of Science and Technology of China, Hefei, China, in 2004, the M.S. degree in Computer Science from the Graduate School, Chinese Academy of Sciences, Beijing, China, in 2007, and the Ph.D. degree in Computer Engineering from Virginia Tech, Blacksburg, VA, in 2012. His research interests are to explore new fundamental understandings of emerging wireless networks, such as cognitive radio networks and MIMO wireless

Y. Thomas Hou (S’91–M’98–SM’04) received his Ph.D. degree in Electrical Engineering from Polytechnic Institute of New York University in 1998. From 1997 to 2002, Dr. Hou was a Researcher at Fujitsu Laboratories of America, Sunnyvale, CA. Since 2002, he has been with Virginia Polytechnic Institute and State University (“Virginia Tech”), the Bradley Department of Electrical and Computer Engineering, Blacksburg, VA, where he is now a Professor. Prof. Hou’s research interests are cross-layer optimization for wireless networks. Specifically, he is most interested in how to make significant improvement for network layer performance by exploiting new advances at the physical layer. He has published extensively in leading IEEE journals and top-tier IEEE/ACM conferences and received five best paper awards from IEEE (including IEEE INFOCOM 2008 Best Paper Award and IEEE ICNP 2002 Best Paper Award). Prof. Hou is currently serving as an Area Editor of IEEE T RANSACTIONS ON W IRELESS C OMMUNICATIONS , and Editor for IEEE T RANSACTIONS ON M OBILE C OMPUTING and IEEE Wireless Communications. He was Technical Program Co-Chair of IEEE INFOCOM 2009. Prof. Hou co-edited a textbook titled Cognitive Radio Communications and Networks: Principles and Practices, which was published by Academic Press/Elsevier, 2010. Wenjing Lou (S’01–M’03–SM’08) is an associate professor at Virginia Polytechnic Institute and State University. Prior to joining Virginia Tech in 2011, she was on the faculty of Worcester Polytechnic Institute from 2003 to 2011. She received her Ph.D. in Electrical and Computer Engineering at the University of Florida in 2003. Her current research interests are in cyber security, with emphases on wireless network security and data security and privacy in cloud computing. She was a recipient of the U.S. National Science Foundation CAREER

networks.

Yi Shi (S’02–M’08) received his Ph.D. degree in Computer Engineering from Virginia Tech, Blacksburg, VA in 2007. He is currently an Adjunct Assistant Professor in the Bradley Department of Electrical and Computer Engineering at Virginia Tech. Dr. Shi’s research focuses on algorithms and optimization for cognitive radio networks, MIMO and cooperative communication networks, sensor networks, and ad hoc networks. He was a recipient of IEEE INFOCOM 2008 Best Paper Award, the only IEEE INFOCOM 2011 Best Paper Award Runner-up, and Chinese Government Award for Outstanding Ph.D. Students Abroad (2006). He serve on technical program committee on some major international conferences (including ACM MobiHoc and IEEE INFOCOM).

1267

award in 2008.

Hanif D. Sherali is a University Distinguished Professor and the W. Thomas Rice Chaired Professor of Engineering in the Industrial and Systems Engineering Department at Virginia Polytechnic Institute and State University. His areas of research interest are in analyzing problems and designing algorithms for specially structured linear, nonlinear, and integer programs arising in various applications, global optimization methods for non-convex programming problems, location and transportation theory and applications, economic and energy mathematical modeling and analysis. He has published over two hundred refereed articles in various Operations Research journals, has (co-) authored six books in this area, and serves on the editorial board of eight journals. He is an elected member of the U.S National Academy of Engineering.

Throughput Maximization for Multi-Hop Wireless ... - IEEE Xplore

Throughput Maximization for Multi-Hop Wireless. Networks with Network-Wide Energy Constraint. Canming Jiang, Yi Shi, Member, IEEE, Y. Thomas Hou, Senior ...

687KB Sizes 0 Downloads 283 Views

Recommend Documents

Throughput Maximization for Opportunistic Spectrum ... - IEEE Xplore
Abstract—In this paper, we propose a novel transmission probability scheduling scheme for opportunistic spectrum access in cognitive radio networks. With the ...

Throughput Maximization for Opportunistic Spectrum ...
Aug 27, 2010 - Throughput Maximization for Opportunistic. Spectrum Access via Transmission. Probability Scheduling Scheme. Yang Cao, Daiming Qu, Guohui Zhong, Tao Jiang. Huazhong University of Science and Technology,. Wuhan, China ...

Intra-vehicular Wireless Networks - IEEE Xplore
cost and labor in harness manufacturing and installation, increased design complexity, etc. Wireless communications provides an intriguing alternative to wiring.

Distributed Sum-Rate Maximization Over Finite Rate ... - IEEE Xplore
of a wired backhaul (typically an x-DSL line) to exchange control data to enable a local coordination with the aim of improving spectral efficiency. Since the backhaul is prone to random (un- predictable) delay and packet drop and the exchanged data

Doppler Spread Estimation for Wireless OFDM Systems - IEEE Xplore
operating conditions, such as large range of mobile subscriber station (MSS) speeds, different carrier frequencies in licensed and licensed-exempt bands, ...

Robot Localization Sensor for Development of Wireless ... - IEEE Xplore
issues for mobile robot. We describe a novel localization sensor suite for the development of a wireless location sensing network. The sensor suite comprises ...

An Integrated Wireless Intersection Simulator for ... - IEEE Xplore
we present the complete architecture of our warning system simulator, Integrated Wireless Intersection Simulator (IWIS) being developed since 2003 [1], [2].

Area Throughput of an IEEE 802.15.4 Based Wireless ...
Many applications of Wireless Sensor Networks (WSNs) deal with the estimation ... IEEE 802.15.4 [5] is a short-range wireless technology intended to.

Area Throughput of an IEEE 802.15.4 Based Wireless Sensor Network
Abstract. In this paper we present a mathematical model to evaluate the performance of an IEEE 802.15.4 based multi-sink Wireless Sen- sor Network (WSN). ... Performance is evaluated by varying the traffic offered to the network (i.e. .... determine

IEEE Photonics Technology - IEEE Xplore
Abstract—Due to the high beam divergence of standard laser diodes (LDs), these are not suitable for wavelength-selective feed- back without extra optical ...

wright layout - IEEE Xplore
tive specifications for voice over asynchronous transfer mode (VoATM) [2], voice over IP. (VoIP), and voice over frame relay (VoFR) [3]. Much has been written ...

Device Ensembles - IEEE Xplore
Dec 2, 2004 - time, the computer and consumer electronics indus- tries are defining ... tered on data synchronization between desktops and personal digital ...

wright layout - IEEE Xplore
ACCEPTED FROM OPEN CALL. INTRODUCTION. Two trends motivate this article: first, the growth of telecommunications industry interest in the implementation ...

Sensor Data Cryptography in Wireless Sensor Networks - IEEE Xplore
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 2, JUNE 2008. 273. Sensor Data Cryptography in. Wireless Sensor ...

Elastic Routing in Wireless Networks With Directional ... - IEEE Xplore
Abstract— Throughput scaling law of a large wireless network equipping directional antennas at each node is analyzed based on the information-theoretic ...

Hierarchically-organized, multihop mobile wireless ...
three key components of this system: the clustering procedures for defining a virtual, hierarchical control struc- ... 95-C-D156, as part of the Global Mobile Information Systems (GloMo) program. 1 ...... an accounting operation which keeps track of

Evolutionary Computation, IEEE Transactions on - IEEE Xplore
search strategy to a great number of habitats and prey distributions. We propose to synthesize a similar search strategy for the massively multimodal problems of ...

I iJl! - IEEE Xplore
Email: [email protected]. Abstract: A ... consumptions are 8.3mA and 1.lmA for WCDMA mode .... 8.3mA from a 1.5V supply under WCDMA mode and.

Throughput Maximization in Cognitive Radio System ...
lows the hyper-Erlang distribution [16]. – When the spectrum sensing at the SU is imperfect, we quantify the impact of sensing errors on the SU performance with ...

Gigabit DSL - IEEE Xplore
(DSL) technology based on MIMO transmission methods finds that symmetric data rates of more than 1 Gbps are achievable over four twisted pairs (category 3) ...

IEEE CIS Social Media - IEEE Xplore
Feb 2, 2012 - interact (e.g., talk with microphones/ headsets, listen to presentations, ask questions, etc.) with other avatars virtu- ally located in the same ...

Grammatical evolution - Evolutionary Computation, IEEE ... - IEEE Xplore
definition are used in a genotype-to-phenotype mapping process to a program. ... evolutionary process on the actual programs, but rather on vari- able-length ...

SITAR - IEEE Xplore
SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services. ∗. Feiyi Wang, Frank Jou. Advanced Network Research Group. MCNC. Research Triangle Park, NC. Email: {fwang2,jou}@mcnc.org. Fengmin Gong. Intrusion Detection Technology Divi